Hope To The End.......... Chip Index

Morphing from one device in order to become another devise that includes more applications. ( more control)
Information databases networked for Total Control and for "Access Denied".
The more things change, the more they are not the same

cycle of metamorphosis

Real-Time Profiling; Upgrading info simultaneously
Unobservable back-end software: every move noted

"As a person's condition or situation changes over time, additional or updated information can be added to the database as needed, without having to replace the chip."

"Access Denied" will be flashed on the computer screen if the ID was not reprogrammed.
If one uses a counterfeit card, this will be denied by the computers and they will be arrested by the guards," del Rosario explained. Such measures were taken to prevent unscrupulous individuals from entering the summit venues
Aside from the computers used in scanning the ID cards, X-ray machines are also in place at the basement and main entrance of the CICC. Security cameras have also been installed along the ceremonial routes and are being monitored from the Technical Operations Center across the CICC"

"If any man worship the beast and his image, and receive his mark in his forehead, or in his hand,
the same shall drink of the wine of the wrath of God,
which is poured out without mixture into the cup of His indignation;
and he shall be tormented with fire and brimstone in the presence of the Lamb:
And the smoke of their torment ascendeth up forever and ever:
and they have no rest day nor night,
who worship the beast and his image, and whosoever receiveth the mark of his name."
Revelation / Apocalypse 14: 9 -- 11


Bible www.blueletterbible.org